wiredmikey writes: Taking another page from Stuxnet, it seems the attackers behind Duqu used a Microsoft Windows zero-day as part of their attack campaign.

Researchers at the Laboratory of Cryptography and System Security (CrySyS) — the group that initially discovered the original Duqu binaries — has located an installer for the malware. The installer file is a malicious Microsoft Word document that exploits a previously-unknown kernel vulnerability that allows code execution.

Once the Word file is opened, the malware executes and installs the Duqu binaries.